MGASA-2015-0322

Source
https://advisories.mageia.org/MGASA-2015-0322.html
Import Source
https://advisories.mageia.org/MGASA-2015-0322.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2015-0322
Related
Published
2015-08-25T18:17:48Z
Modified
2015-08-25T18:02:24Z
Summary
Updated gnutls packages fix security vulnerabilities
Details

It was reported that GnuTLS does not check whether the two signature algorithms match on certificate import (CVE-2015-0294).

Kurt Roeckx discovered that decoding a specific certificate with very long DistinguishedName (DN) entries leads to double free. A remote attacker can take advantage of this flaw by creating a specially crafted certificate that, when processed by an application compiled against GnuTLS, could cause the application to crash resulting in a denial of service (CVE-2015-6251).

References
Credits

Affected packages

Mageia:5 / gnutls

Package

Name
gnutls
Purl
pkg:rpm/mageia/gnutls?distro=mageia-5

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.2.21-1.1.mga5

Ecosystem specific

{
    "section": "core"
}

Mageia:4 / gnutls

Package

Name
gnutls
Purl
pkg:rpm/mageia/gnutls?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.2.7-1.7.mga4

Ecosystem specific

{
    "section": "core"
}